Personal privacy violation

The rapid development of network technology has brought significant changes to the political, economic, cultural, and educational fields of society, and has also changed people’s lifestyles and become more convenient. However, when people enjoy the convenience and speed brought by the network, at the same time, the network also quietly breaks the boundaries between time and space, and violates personal privacy. Only when we are threatened or violated by the network, we can realize that the network is not as good as we think.

First of all, in my daily life, I can often feel personal privacy violations, such as online shopping, when you browse some things, it will record your online habits, and the network will automatically recommend similar products for you. Personal privacy violations on the Internet made me feel even more terrible, it can almost leak everything about me. If you are an international student, I believe that you are likely to have a similar experience with me. I received a fraudulent phone call from the Embassy. The criminal pretends to be an embassy staff member and then claims that I am involved in a cross-border money laundering case, or I have a parcel containing 20 credit cards. This parcel violates some laws. I have to go to Toronto to get the parcel, and there are other similarities. The incident, even though these examples sound ridiculous, but when they can not only say my name, domestic ID number, mobile number, or even know where I am, the name of the parents, this information makes me dare not believe it. This time, I realized that my information was completely leaked. It looks like an internet fraud, but from another perspective, this is a violation of personal privacy. Just because they know my personal information, they can do whatever they want. This is a very terrible thing, because they have such detailed personal information, which will cause some students to be deceived, not only lose a lot of money, but even risk losing their lives. (Interestingly, even if we have already seen their tricks, these people will still dial the same mobile number multiple times.)

As I described my experiences in the previous paragraph. Like the first video I saw online, in the “Terrorist Pizza”, when the staff connected the system, he knew everything about Mr. Kelly, including address, mobile phone, work address, health status, credit card usage records, and even his wife. Personal information, the network can discover all the personal information of a person, it not only knows all of our personal information, it also monitors us and the people we have been with us, personal privacy violations keep us and the people we care about in an insecure Status. Most of the time, we don’t even know that our privacy has been violated. In the second video, even if we only surfed the Internet for ten minutes, through those connected points, we can see that various websites we don’t know are invading privacy. It is worth mentioning that “The internet is increasing a privately-owned public space. On April 3, 2017, Donald Trump signed into law a bill overturning Obama-era protections for internet users. The new law permits Internet Service Providers (ISPs ) to access, without permission, data about our internet use patterns — from the sites we visit to the search terms we use and the data isn’t restricted to the work we do on computers ”(Morris & Stommel, 2018). Personally, I think this poses a threat to the online security. At the same time, unauthorized access means violations. Such a law can condone more and more large-scale monitoring behaviors. Just like what happened in 2013. The Snowden incident of the year, the National Security Agency implemented an electronic surveillance program: people can be monitored via email, voice chat, photos, video network materials and various details. The Snowden incident has had a huge impacts and Social panic. This undoubtedly shows a strong rejection of privacy violations.

I believe that infringement of personal information on the Internet is a disrespect for people. People will have no secrets and will be controlled by a variety of profitable people.


Morris, S. M., & Stommel, J. (2018). A Guide for Resisting Edtech: The Case Against Turnitin. An Urgency of Teachers. Retrieved from:


From a sociological point of view, human beings are social animals and therefore create a concept of community. Whether in ancient times, people lived in groups and had similar ideas. The article mentions that “in practice, community traditionally has been place centered, where individuals within the same physical space have identified with each other” (Major,2015). However, our community concept has changed due to the development of network technology. We can learn by grouping online through social media. Even if you are not in the same physical space, you can form a learner community through the Internet even if you don’t live in a very close place. Today’s learning is closely related to social media, especially online teaching. All communication is done through the Internet. Teachers can arrange homework and online testing. And organize online learning groups, just like the learning pod. Generally speaking, after students have finished face-to-face classes at school, if there is a group task, believe me, a large number of students will communicate through social networks, not face-to-face communication. For me, my communication with the team members is through Facebook or Skype. We agreed to study at the same time and with voice or video. We don’t need to book any place. We don’t need to arrive a place for 30 minute‘s meeting from work place or home. For me, this is actually a face-to-face communication. It is the same, not the lack of participation and the scene environment mentioned in the article. The emergence of social media is only more convenient for the communication and communication of the learning community. So I think there is a lot of connection between social media and the learner community. It plays an important role in online teaching, and students can search for anything on social media. For example, YouTube’s many video tutorials are even more clear and easy to understand than traditional face-to-face teaching. Just search for keywords to display video teaching of many related content. Many teachers who teach at school also post their own videos on the Internet. They also recognize the feasibility of social media learning.


Major, C. H. (2015). Teaching online: A guide to theory, research, and practice. Baltimore, Maryland: Johns Hopkins University Press.

Welcome and Introduction

Before you get started, please send your instructor an email with the URL to your site, which will be [yoururl] This step is critical as your work will be completed on your blog and I need to know where to find you.

First tasks you should explore with your new blog:

  • Go into its admin panel by adding /wp-admin at the end of your blog’s URL.
  • Tap “Settings” and change the email address to your email address, then make sure you check your email and confirm the change.

change email address

  • Add new categories or tags to organize your blog posts – found under “Posts” (but do not remove the pre-existing “edtechuvic” or “Distributed & Open” categories)
  • See if your blog posts are appearing on the course website (you must have the course categories assigned to a post first and have provided your instructor with your blog URL)
    • It can take an hour or so for your posts to appear on the course site.
  • Add an “About Me” or a page welcoming visitors to your site.
  • Embed images or set featured images and embed video in blog posts and pages (can be your own media or that found on the internet, but consider free or creative commons licensed works, like found at or
  • Under Appearance:
    • Select your preferred website theme and customize to your preferences (New title, etc.)
    • Customize menus & navigation
    • Use widgets to customize blog content and features
  • Delete this starter post and the test posts.